Published September 30, 2023 | Version 1
Journal article Open

The Impact of IMSI Catcher Deployments on Cellular Network Security: Challenges and Countermeasures in 4G and 5G Networks

  • 1. ROR icon University of Sulaimani

Description

IMSI (International Mobile Subscriber Identity) catchers, also known as "Stingrays" or "cell site simulators," are rogue devices 
that pose a significant threat to cellular network security [1]. IMSI catchers can intercept and manipulate cellular communications, 
compromising the privacy and security of mobile devices and their users. With the advent of 4G and 5G networks, IMSI catchers have become more sophisticated and pose new challenges to cellular network security [2].

This paper provides an overview of the impact of IMSI catcher deployments on cellular network security in the context of 4G and 5G networks. It discusses the challenges posed by IMSI catchers, including the unauthorized collection of IMSI numbers, interception of communications, and potential misuse of subscriber information. It also highlights the potential consequences of IMSI catcher deployments, including the compromise of user privacy, financial fraud, and unauthorized surveillance. The paper further reviews the countermeasures that can be employed to mitigate the risks posed by IMSI catchers. These countermeasures include network-based solutions such as signal analysis, encryption, and authentication mechanisms, as well as user-based solutions such as mobile applications and device settings. The paper also discusses the limitations and effectiveness of these countermeasures in the context of 4G and 5G networks.

Finally, the paper identifies research gaps and future directions for enhancing cellular network security against IMSI catchers in the era of 4G and 5G networks. This includes the need for improved encryption algorithms, authentication mechanisms, and detection techniques to effectively detect and prevent IMSI catcher deployments. The paper also emphasizes the importance of regulatory and policy measures to govern the deployment and use of IMSI catchers to protect user privacy and security.

Files

The Impact of IMSI Catcher Deployments on Cellular Network Security Challenges and Countermeasures in 4G and 5G Network.pdf

Additional details

Dates

Accepted
2023-09-30

References

  • [1] Barnes, R. (2014). Cell-site simulators, IMSI catchers and the 4th amendment: a proposal for a warrant requirement. Journal of Criminal Law & Criminology, 104, 129-162.
  • [2] Bibi, F. (2019). IMSI Catchers and their challenges to cellular network security: A review. International Journal of Computer Science and Information Security, 17(7), 18-26.
  • [3] Bourgeon, J., & Gendreau, M. (2018). IMSI Catchers: A Threat to Privacy and Security of Cellular Networks. International Journal of Information and Communication Technology Research, 8(3), 48-54.
  • [4] Lilly, A. (2017). IMSI catchers: hacking mobile communications. Network Security, 2017(2), 5-7.
  • [5] Papagrigoriou, P., Plemenos, A., & Askoxylakis, I. G. (2014). Discrete Hardware Apparatus and Method for Mobile Application and Communication Security. In Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings 2 (pp. 102-112). Springer International Publishing.
  • [6] Van Den Broek, F., Verdult, R., & De Ruiter, J. (2015, October). Defeating IMSI catchers. In Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (pp. 340-351).
  • [7] Hernandez-Castro, Julio Cesar, Jianying Zhou, and Josep Domingo-Ferrer. "IMSI-catcher detection techniques: A survey." IEEE Communications Surveys & Tutorials 20, no. 4 (2018): 3417-3436.
  • [8] Park, S., Shaik, A., Borgaonkar, R., & Seifert, J. P. (2019, November). Anatomy of commercial IMSI catchers and detectors. In Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society (pp. 74-86).
  • [9] Yu, C., Chen, S., & Cai, Z. (2019). Lte phone number catcher: A practical attack against mobile privacy. Security and Communication Networks, 2019, 1-10.
  • [10] Liu, Y., & Ning, P. (2018). Survey on cellular network security: Technical challenges, recent advances, and future directions. IEEE Communications Surveys & Tutorials, 20(3), 2483-2512. doi: 10.1109/comst.2018.2802947.
  • [11] Greenwald, G. (2014). The surveillance state and its discontents. Cato Journal, 34(3), 515-525.
  • [12] Alrashede, H., & Shaikh, R. A. (2019, May). IMSI catcher detection method for cellular networks. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE.
  • [13] Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014, December). IMSI-catch me if you can: IMSI-catcher-catchers. In Proceedings of the 30th annual computer security applications Conference (pp. 246-255).
  • [14] Kumar, T., Liyanage, M., Ahmad, I., Braeken, A., & Ylianttila, M. (2018). User privacy, identity and trust in 5G. A Comprehensive Guide to 5G Security, 267-279.
  • [15] Vidoni, M. (2022). 5G Technology: New Challenges for Law Enforcement Agencies to Face. European Law Enforcement Research Bulletin, 22, 22-pages.
  • [16] Dabrowski, A., Petzl, G., & Weippl, E. R. (2016). The messenger shoots back: Network operator based IMSI catcher detection. In Research in Attacks, Intrusions, and Defenses: 19th International Symposium, RAID 2016, Paris, France, September 19-21, 2016, Proceedings 19 (pp. 279-302). Springer International Publishing.
  • [17] Alrashede, H., & Shaikh, R. A. (2019, May). IMSI catcher detection method for cellular networks. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE.
  • [18] Mjølsnes, S. F., & Olimid, R. F. (2017). Easy 4G/LTE IMSI catchers for non-programmers. In Computer Network Security: 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings 7 (pp. 235-246). Springer International Publishing.
  • [19] Koutsos, A. (2019, June). The 5G-AKA authentication protocol privacy. In 2019 IEEE European symposium on security and privacy (EuroS&P) (pp. 464-479). IEEE.
  • [20] Aragon, S., Kuhlmann, F., & Villa, T. (2015, May). Sdr-based network impersonation attack in gsm-compatible networks. In 2015 IEEE 81st Vehicular Technology Conference (VTC Spring) (pp. 1-5). IEEE.
  • [21] Vachhani, K. (2019). Security threats against LTE networks: A survey. In Security in Computing and Communications: 6th International Symposium, SSCC 2018, Bangalore, India, September 19–22, 2018, Revised Selected Papers 6 (pp. 242-256). Springer Singapore.
  • [22] Kallioinen, J., Karvonen, T., & Manner, J. (2019). 5G Authentication and Key Management: Vulnerabilities and Solutions. IEEE Communications Standards Magazine, 3(4), 35-41.
  • [23] Norrman, K., Näslund, M., & Dubrova, E. (2016, June). Protecting IMSI and user privacy in 5G networks. In Proceedings of the 9th EAI international conference on mobile multimedia communications (pp. 159-166).
  • [24] Zhao, J., Li, Q., Yuan, Z., Zhang, Z., & Lu, S. (2022, October). 5G Messaging: System Insecurity and Defenses. In 2022 IEEE Conference on Communications and Network Security (CNS) (pp. 37-45). IEEE.
  • [25] Chaudhari, A. S. (2015). Security analysis of SMS and related technologies. Research Master Thesis, Dept. of Mathematics and Computer Science, Eindhoven University of Technology.
  • [26] Bromley, M., Steenhoek, K. S., Halink, S. I. M. O. N. E., & Wijkstra, E. V. E. L. I. E. N. (2016). ICT surveillance systems: trade policy and the application of human security concerns. Strategic Trade Review, 2(2), 37-52.
  • [27] Sutherland, E. (2018). Digital privacy in Africa: cybersecurity, data protection & surveillance. Data Protection & Surveillance (June 22, 2018).
  • [28] Cámara, P. C., & Vara, M. G. A TELCO ODYSSEY 5G SUCI-CRACKER AND SCTP-HIJACKER.
  • [29] Sahin, M., Francillon, A., Gupta, P., & Ahamad, M. (2017, April). Sok: Fraud in telephony networks. In 2017 IEEE European Symposium on Security and Privacy (EuroS&P) (pp. 235-250). IEEE.
  • [30] Mohsin, J. K., Han, L., Hammoudeh, M., & Hegarty, R. (2017, July). Two factor vs multi-factor, an authentication battle in mobile cloud computing environments. In Proceedings of the international conference on future networks and distributed systems (pp. 1-10).
  • [31] Rupprecht, D., Kohls, K., Holz, T., & Pöpper, C. (2020, February). IMP4GT: IMPersonation Attacks in 4G NeTworks. In NDSS.
  • [32] Angelogianni, A., Politis, I., Mohammadi, F., & Xenakis, C. (2020). On identifying threats and quantifying cybersecurity risks of mnos deploying heterogeneous rats. IEEE Access, 8, 224677-224701.
  • [33] Borgaonkar, R., Hirschi, L., Park, S., & Shaik, A. (2018). New privacy threat on 3G, 4G, and upcoming 5G AKA protocols. Cryptology ePrint Archive.
  • [34] Choraś, M., Kozik, R., & Maciejewska, I. (2016). Emerging cyber security: Bio-inspired techniques and MITM detection in IoT. Combatting Cybercrime and Cyberterrorism: Challenges, Trends and Priorities, 193-207.
  • [35] Ooi, J., & Neninger, N. (2015). IMSI catchers and mobile security. School of Engineering and Applied Science University of Pennsylvania.
  • [36] Mavoungou, S., Kaddoum, G., Taha, M., & Matar, G. (2016). Survey on threats and attacks on mobile networks. IEEE Access, 4, 4543-4572.
  • [37] Rupprecht, D., Kohls, K., Holz, T., & Pöpper, C. (2019, May). Breaking LTE on layer two. In 2019 IEEE Symposium on Security and Privacy (SP) (pp. 1121-1136). IEEE.
  • [38] Kohls, K., Rupprecht, D., Holz, T., & Pöpper, C. (2019, May). Lost traffic encryption: fingerprinting LTE/4G traffic on layer two. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks (pp. 249-260).
  • [39] Weinmann, R. P. (2012, August). Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks. In WOOT (pp. 12-21).
  • [40] Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014, December). IMSI-catch me if you can: IMSI-catcher-catchers. In Proceedings of the 30th annual computer security applications Conference (pp. 246-255).
  • [41] Papin, J. A., Hunter, T., Palsson, B. O., & Subramaniam, S. (2005). Reconstruction of cellular signalling networks and analysis of their properties. Nature reviews Molecular cell biology, 6(2), 99-111.
  • [42] Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., & Weippl, E. (2014, December). IMSI-catch me if you can: IMSI-catcher-catchers. In Proceedings of the 30th annual computer security applications Conference (pp. 246-255).
  • [43] He, L., Yan, Z., & Atiquzzaman, M. (2018). LTE/LTE-A network security data collection and analysis for security measurement: A survey. IEEE Access, 6, 4220-4242.
  • [44] Steig, S., Aarnes, A., Van Do, T., & Nguyen, H. T. (2016, September). A network based imsi catcher detection. In 2016 6th International Conference on IT Convergence and Security (ICITCS) (pp. 1-6). IEEE.
  • [45] Palamà, I., Gringoli, F., Bianchi, G., & Melazzi, N. B. (2020, September). The diverse and variegated reactions of different cellular devices to IMSI catching attacks. In Proceedings of the 14th International Workshop on Wireless Network Testbeds, Experimental evaluation & Characterization (pp. 80-86).
  • [46] Ooi, J., & Neninger, N. (2015). IMSI catchers and mobile security. School of Engineering and Applied Science University of Pennsylvania.
  • [47] Ney, P., Smith, I., Cadamuro, G., & Kohno, T. (2017). SeaGlass: Enabling City-Wide IMSI-Catcher Detection. Proc. Priv. Enhancing Technol., 2017(3), 39.
  • [48] Blefari Melazzi, N., Bianchi, G., Gringoli, F., & Palamà, I. (2021). IMSI Catchers in the wild: a real world 4G/5G assessment. COMPUTER NETWORKS, 194.